The Parties acknowledge a. the Friends’ support to the ANBG through the activities of the Friends is of significant value and benefit to DNP;
b. access to the ANBG and appropriate facilities at the ANBG (subject to availability) for the conduct of the Friends’ activities is essential to the Friends’ ability to support the ANBG;
c. the value of sharing resources wherever practical;
d. access to the expertise of management and staff of the ANBG assists the Friends in carrying out its activities;
e. activities of the Friends in the ANBG needs to be consistent with management of the ANBG in accordance with the EPBC Act and EPBC Regulations and DNP’s statutory obligations;
f. activities of the Friends in the ANBG need to be done with the knowledge of DNP;
g. each party must respect any information provided in confidence;
h. the need to work co-operatively to strengthen existing collaborative arrangements; and
i. the need for ethical and professional conduct to ensure that the reputation and credibility of each Party is maintained.
The Parties acknowledge and agree that Shorebird is a service provider for the purposes of the CCPA (to the extent it applies) and is receiving personal information from Customer in order to provide the Subscriptions pursuant to the Agreement, which constitutes a business purpose. Shorebird shall not sell any such Personal Information. Shorebird shall not retain, use or disclose any Personal Information provided by Customer pursuant to the Agreement except as necessary for the specific purpose of providing the Subscriptions for Customer pursuant to the Agreement, or otherwise as set forth in the Agreement or as permitted by the CCPA. The terms “personal information,” “service provider,” “sale,” and “sell” are as defined in Section 1798.140 of the CCPA.
1. Ensure that the Personal Data can be accessed only by authorized personnel for the purposes set forth in Annex 1 of this DPA.
2. Take all reasonable measures to prevent unauthorized access to the Personal Data through the use of appropriate physical and logical (passwords) entry controls, securing areas for data processing, restricted (e.g. role-based) access to Personal Data, and implementing procedures for monitoring the use of data processing facilities;
3. Use secure password controls designed to manage and control password strength, expiration and usage;
4. Use of network intrusion detection technology, encryption and authentication technology, secure logon procedures and virus protection;
5. Account for all the risks that are presented by processing, for example from accidental or unlawful destruction, loss, or alteration, unauthorized or unlawful storage, processing, access or disclosure of Personal Data;
6. Ensure pseudonymization and/or encryption of Personal Data, where appropriate
7. Maintain the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
8. Maintain the ability to restore the availability and access to Personal Data in a timely manner in the event of a physical or technical incident;
9. Implement a process for regularly testing, assessing, and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing of Personal Data;
10. Monitor compliance on an ongoing basis and reporting the condition of its information security and compliance to internal senior management;
11. Implement measures to identify vulnerabilities, security threats, viruses and other malicious code with regard to the proc...
The Parties acknowledge that they may pursue opportunities that may compete or conflict with the subject matter of this Agreement and, subject to protecting the Confidential Information that is the subject matter of this Agreement in a manner required by this Agreement, are free to pursue such opportunities.